/openthread-latest/third_party/mbedtls/repo/library/ |
D | base64.c | 62 const unsigned char *src, size_t slen) in mbedtls_base64_encode() argument 68 if (slen == 0) { in mbedtls_base64_encode() 73 n = slen / 3 + (slen % 3 != 0); in mbedtls_base64_encode() 87 n = (slen / 3) * 3; in mbedtls_base64_encode() 102 if (i < slen) { in mbedtls_base64_encode() 104 C2 = ((i + 1) < slen) ? *src++ : 0; in mbedtls_base64_encode() 110 if ((i + 1) < slen) { in mbedtls_base64_encode() 129 const unsigned char *src, size_t slen) in mbedtls_base64_decode() argument 140 for (i = n = 0; i < slen; i++) { in mbedtls_base64_decode() 143 while (i < slen && src[i] == ' ') { in mbedtls_base64_decode() [all …]
|
D | pkcs5.c | 270 size_t plen, const unsigned char *salt, size_t slen, in pkcs5_pbkdf2_hmac() argument 298 if ((ret = mbedtls_md_hmac_update(ctx, salt, slen)) != 0) { in pkcs5_pbkdf2_hmac() 360 size_t plen, const unsigned char *salt, size_t slen, in mbedtls_pkcs5_pbkdf2_hmac() argument 364 return pkcs5_pbkdf2_hmac(ctx, password, plen, salt, slen, iteration_count, in mbedtls_pkcs5_pbkdf2_hmac() 371 size_t plen, const unsigned char *salt, size_t slen, in mbedtls_pkcs5_pbkdf2_hmac_ext() argument 389 ret = pkcs5_pbkdf2_hmac(&md_ctx, password, plen, salt, slen, in mbedtls_pkcs5_pbkdf2_hmac_ext()
|
D | bignum.c | 515 size_t i, j, slen, n; in mbedtls_mpi_read_string() local 536 slen = strlen(s); in mbedtls_mpi_read_string() 539 if (slen > SIZE_MAX >> 2) { in mbedtls_mpi_read_string() 543 n = BITS_TO_LIMBS(slen << 2); in mbedtls_mpi_read_string() 548 for (i = slen, j = 0; i > 0; i--, j++) { in mbedtls_mpi_read_string() 555 for (i = 0; i < slen; i++) { in mbedtls_mpi_read_string() 702 size_t slen; in mbedtls_mpi_read_file() local 719 slen = strlen(s); in mbedtls_mpi_read_file() 720 if (slen == sizeof(s) - 2) { in mbedtls_mpi_read_file() 724 if (slen > 0 && s[slen - 1] == '\n') { in mbedtls_mpi_read_file() [all …]
|
D | ecdsa.c | 611 size_t *slen) in ecdsa_signature_to_asn1() argument 631 *slen = len; in ecdsa_signature_to_asn1() 642 unsigned char *sig, size_t sig_size, size_t *slen, in mbedtls_ecdsa_write_signature_restartable() argument 676 MBEDTLS_MPI_CHK(ecdsa_signature_to_asn1(&r, &s, sig, sig_size, slen)); in mbedtls_ecdsa_write_signature_restartable() 691 unsigned char *sig, size_t sig_size, size_t *slen, in mbedtls_ecdsa_write_signature() argument 696 ctx, md_alg, hash, hlen, sig, sig_size, slen, in mbedtls_ecdsa_write_signature() 705 const unsigned char *sig, size_t slen) in mbedtls_ecdsa_read_signature() argument 708 ctx, hash, hlen, sig, slen, NULL); in mbedtls_ecdsa_read_signature() 716 const unsigned char *sig, size_t slen, in mbedtls_ecdsa_read_signature_restartable() argument 721 const unsigned char *end = sig + slen; in mbedtls_ecdsa_read_signature_restartable()
|
D | rsa.c | 1618 size_t slen, mbedtls_md_type_t md_alg) in mgf_mask() argument 1657 if ((ret = mbedtls_md_update(&md_ctx, src, slen)) != 0) { in mgf_mask() 1694 const unsigned char *salt, size_t slen, in hash_mprime() argument 1720 if ((ret = mbedtls_md_update(&md_ctx, salt, slen)) != 0) { in hash_mprime() 2123 size_t slen, min_slen, hlen, offset = 0; in rsa_rsassa_pss_sign_no_mode_check() local 2171 slen = hlen; in rsa_rsassa_pss_sign_no_mode_check() 2173 slen = olen - hlen - 2; in rsa_rsassa_pss_sign_no_mode_check() 2178 slen = (size_t) saltlen; in rsa_rsassa_pss_sign_no_mode_check() 2185 p += olen - hlen - slen - 2; in rsa_rsassa_pss_sign_no_mode_check() 2190 if ((ret = f_rng(p_rng, salt, slen)) != 0) { in rsa_rsassa_pss_sign_no_mode_check() [all …]
|
D | psa_crypto_rsa.c | 462 int slen = rsa_pss_expected_salt_len(alg, rsa, hash_length); in mbedtls_psa_rsa_verify_hash() local 468 slen, in mbedtls_psa_rsa_verify_hash()
|
D | ssl_tls.c | 401 typedef int (*tls_prf_fn)(const unsigned char *secret, size_t slen, 430 static int tls_prf_sha256(const unsigned char *secret, size_t slen, 441 static int tls_prf_sha384(const unsigned char *secret, size_t slen, 467 const unsigned char *secret, size_t slen, in mbedtls_ssl_tls_prf() argument 491 return tls_prf(secret, slen, label, random, rlen, dstbuf, dlen); in mbedtls_ssl_tls_prf() 6747 const unsigned char *secret, size_t slen, in tls_prf_generic() argument 6771 if (slen != 0) { in tls_prf_generic() 6777 status = psa_import_key(&key_attributes, secret, slen, &master_key); in tls_prf_generic() 6827 const unsigned char *secret, size_t slen, in tls_prf_generic() argument 6868 ret = mbedtls_md_hmac_starts(&md_ctx, secret, slen); in tls_prf_generic() [all …]
|
D | ssl_misc.h | 581 typedef int mbedtls_ssl_tls_prf_cb(const unsigned char *secret, size_t slen,
|
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/ |
D | ecdsa.h | 475 unsigned char *sig, size_t sig_size, size_t *slen, 522 unsigned char *sig, size_t sig_size, size_t *slen, 556 const unsigned char *sig, size_t slen); 591 const unsigned char *sig, size_t slen,
|
D | base64.h | 46 const unsigned char *src, size_t slen); 66 const unsigned char *src, size_t slen);
|
D | pkcs5.h | 151 size_t plen, const unsigned char *salt, size_t slen, 177 size_t slen,
|
D | ssl.h | 5587 const unsigned char *secret, size_t slen,
|
/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_ecdsa.function | 437 size_t slen; 450 slen = sizeof(sig); 459 &slen, 466 TEST_ASSERT(slen == sig_check->len); 467 TEST_ASSERT(memcmp(sig, sig_check->x, slen) == 0); 481 &slen,
|
D | test_suite_pk.function | 1260 size_t slen; 1279 slen = sizeof(sig); 1283 sig, sizeof(sig), &slen, 1289 TEST_ASSERT(slen == sig_check->len); 1290 TEST_ASSERT(memcmp(sig, sig_check->x, slen) == 0); 1298 hash->x, hash->len, sig, slen, &rs_ctx); 1308 hash->x, hash->len, sig, slen, &rs_ctx); 1317 hash->x, hash->len, sig, slen, &rs_ctx); 1321 slen = sizeof(sig); 1323 sig, sizeof(sig), &slen,
|
D | test_suite_psa_crypto.data | 4602 PSA verify hash: RSA-1024 PSS SHA-256, slen=0 (bad) 4606 PSA verify hash: RSA-1024 PSS-any-salt SHA-256, slen=0 4610 PSA verify hash: RSA-1024 PSS SHA-256, slen=31 (bad) 4614 PSA verify hash: RSA-1024 PSS-any-salt SHA-256, slen=31 4618 PSA verify hash: RSA-1024 PSS SHA-256, slen=32 4622 PSA verify hash: RSA-1024 PSS-any-salt SHA-256, slen=32 4626 PSA verify hash: RSA-1024 PSS SHA-256, slen=94 (bad) 4630 PSA verify hash: RSA-1024 PSS-any-salt SHA-256, slen=94 4634 PSA verify hash: RSA-1024 PSS SHA-512, slen=61 (bad) 4638 PSA verify hash: RSA-1024 PSS-any-salt SHA-512, slen=61 [all …]
|